EUTM file information

018650199

DEFEND-AS-ONE


February 7, 2022

Trademark Summary

The trademark application DEFEND-AS-ONE was filed by Risk Ledger Ltd, a corporation established under the laws of the United Kingdom of Great Britain and Northern Ireland (the "Applicant"). Application withdrawn.

The application was filed in English (Italian was selected as the second language).

The Refusal with reference B 018650199 was Rejected according to Article 7(1)(b) EUTMR with decision issued on July 14, 2022 by the EUIPO.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer software and hardware for digital security
    2. Computer security products, namely, computer peripherals
    3. Computer hardware and software, namely, network security appliances, email security appliances, digital data and media security appliances and security software applications
    4. Computer software and computer hardware for detection, blocking, and facilitating removal and remediation of computer malware, cyber-attacks, malicious attacks, and advanced persistent threats
    5. Computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices
    6. Computer software and hardware providing secure networks, virtual computer systems and virtual computer environments
    7. Software for use in managing online consumer privacy issues
    8. Computer software that performs collection of security information and analyzes it based on multiple algorithms to identify security risks
    9. Security analytics software for monitoring network security and identifying threats and vulnerabilities.
  • The mark was filed in class 35 with following description of goods:
    1. Management of computer databases
    2. Computerised data processing
    3. Providing data searches in computer files for others
    4. Data logging, data retrieval services
    5. Data services, namely capturing, searching, exploring, identifying, analysing, processing, managing, monitoring, aggregating and modelling of data for business purposes
    6. Business data analysis and analytics
    7. Business research services
    8. Business process modelling
    9. Business modelling to support operational risk analysis
    10. Business risk management services
    11. Business services relating to security, cyber security, computer security, security software, encryption, information assurance, product assurance, information technology and computer risk
    12. Preparation of business risk reports, commercial reports and economic reports
    13. Collecting cyber security intelligence data
    14. Information, advisory and consultancy services relating to all the aforesaid services.
  • The mark was filed in class 42 with following description of goods:
    1. Technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices
    2. Technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber-security systems
    3. Technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks
    4. Cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks
    5. Computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability
    6. Monitoring of cyber security intelligence data
    7. Providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks
    8. Development, updating and maintenance of software for networks and standalone computers in the fields of security
    9. Computer consulting services in the field of analysing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data
    10. Providing services in the field of unified security analytics, mainly, to measure, track and reduce cyber security risks and identify anomalous activity across computer networks
    11. Technical consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software
    12. Data services, namely storing of electronic data.